US20170034290A1 - Delegated updates - Google Patents

Delegated updates Download PDF

Info

Publication number
US20170034290A1
US20170034290A1 US14/809,301 US201514809301A US2017034290A1 US 20170034290 A1 US20170034290 A1 US 20170034290A1 US 201514809301 A US201514809301 A US 201514809301A US 2017034290 A1 US2017034290 A1 US 2017034290A1
Authority
US
United States
Prior art keywords
user
designated
users
delegation
computer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US14/809,301
Other versions
US10158732B2 (en
Inventor
Alaa Abou Mahmoud
Paul R. Bastide
Fang Lu
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US14/809,301 priority Critical patent/US10158732B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: ABOU MAHMOUD, ALAA, BASTIDE, PAUL R., LU, FANG
Publication of US20170034290A1 publication Critical patent/US20170034290A1/en
Application granted granted Critical
Publication of US10158732B2 publication Critical patent/US10158732B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/535Tracking the activity of the user
    • H04L67/22
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/16Threshold monitoring

Definitions

  • Online social networks can be used to connect with other users, enable sharing between users, and process information between users.
  • Online social networks can include social networks on a local network, a wide area network, utilizing the Internet, or a mail client including web-based email.
  • Common techniques of sharing and processing information can include an inbox, a post, or a profile on a social network. These techniques enable users to share information with others, or gather information from others. However, when a user is unable to access the social network there is a lack of alternative methods to post content, and to ascertain a user's absence, as well as to notify others of the user's absence.
  • an identity provider of a social network may be unavailable for users who wish to login; a user can be locked out of a system or social network; a user's machine may be down (for example, nonfunctioning, broken, unavailable; lost or stolen), or a user's network access can be unavailable.
  • a user's online presence can be unavailable or offline. Issues that can occur when a user's online presence is unavailable include, for example: a user's input or contribution to the social group or network is not present; the other users' in the social group are not informed of the status of the unavailable user; and an alternative contact for the unavailable user may not be available.
  • a computer implemented method delegates authority on an online account.
  • the method monitors a user using a computer, the user is part of an online social network accessed using a communications system, and the online social network includes a plurality of users.
  • a designated user for the user from the plurality of users is assigned, responsive to the user's selection of the designated user.
  • the designated user is activated, responsive to determining an absence of access of the user on the online social network.
  • a delegation action is presented to the designated user. The delegation action is performed on behalf of the user, responsive to the designated user's selection of the delegation action.
  • a computer program product delegates authority on an online account.
  • the computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se.
  • the program instructions are executable by a computer to cause the computer to perform a method, comprising: monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users; assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user; activating the designated user, responsive to determining an absence of access of the user on the online social network; presenting a delegation action to the designated user; and performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
  • a computer system delegates authority on an online account.
  • the computer system includes one or more computer processors, one or more computer-readable storage media, and program instructions stored on one or more of the computer-readable storage media for execution by at least one of the one or more processors.
  • the program instructions comprise: monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users; assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user; activating the designated user, responsive to determining an absence of access of the user on the online social network; presenting a delegation action to the designated user; and performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
  • FIG. 1 is a schematic block diagram illustrating an overview of a system and methodology for delegating authority on an online account according to an embodiment of the disclosure.
  • FIG. 2 is a flow chart illustrating a method for delegating authority on an online account based on FIG. 1 according to an embodiment of the disclosure.
  • FIG. 3 is a schematic block diagram illustrating a method and system for delegating authority of an online account based on FIGS. 1 and 2 , according to an embodiment of the disclosure.
  • the method 100 includes monitoring a user of a plurality of users using an online social network 84 on a communications system, as in block 104 .
  • Users 60 are shown in FIG. 1 using a representative device 70 , which is envisioned as exemplary of each of the users.
  • the device 70 includes a computer system 20 .
  • the device 70 can be a mobile device, or other types of computer devices.
  • the device 70 includes a social networking software application 74 (also referred to as a social networking application), or can access a social network using a web browser (not shown) for accessing the Internet and accessing websites on the World Wide Web.
  • a delegation application 78 is included on the device 70 , which can be a separate application as shown in FIG. 1 , and alternatively can be part (or integral with) the social networking application.
  • the users 60 can access the social network 84 using the device 70 via a communication system embodied as communications network 80 , which can include, for example, the Internet, a telephone system, or a local area network.
  • a communication system embodied as communications network 80 , which can include, for example, the Internet, a telephone system, or a local area network.
  • a functional diagram 200 with respect to the system 10 and method 100 includes an originating user 62 (as an embodiment of a user from the plurality of users 60 accessing the social network).
  • the originating user selects a designated user 64 from the plurality of users 60 , as in block 108 .
  • the method 100 assigns the designated user 64 for the originating user, as in block 112 .
  • the designated user may be a work colleague, a friend, relative, or supervisor in a working relationship.
  • the method 100 can be implemented using the delegation application 78 shown in FIG. 1 .
  • the method can also be provided as a service which can be remote, for instance, including an application residing on a remote server exemplified by remote server 90 .
  • the method determines an absence of access of the originating user 208 on the online social network, as in block 116 .
  • an absence 208 can be determined by a lack of logging in by the originating user for a period of time.
  • a user can be determined as absent if no activity has been logged within a time threshold.
  • an absence of access of the originating user can be determined by an absence of communication of the originating user which can include an absence of logging into the online social network.
  • Another indication of absence of access of the originating user can be an absence of a device connection to the online social network.
  • a lack of connection can be determined to indicate an absence of access when it occurs during a specified time frame, or exceeds a specified threshold time duration.
  • a lack of posts by an originating user, or alternatively a quantity of posts that do not meet a threshold can indicate an absence of access.
  • the method 100 includes activating the designated user 64 , as in block 120 , when an absence of the originating user is detected, as in block 118 .
  • the method activates the designated user, as in block 120 .
  • the method returns to block 104 .
  • a delegation action 216 ( FIG. 3 ) is presented to the designated user 64 , as in block 124 .
  • the designated user selects a delegation action, as in block 128 .
  • the delegation action can be one action or a group a delegation actions for the designated user to select from.
  • the designated user can select one or more delegation actions.
  • the delegation action can include, for example, approving of a post; sending a message; sending a message of unavailability of the originating user; or other tasks on behalf of the originating user.
  • the method 100 includes performing the delegation action 216 on behalf of the originating user 62 , as in block 132 , responsive to the designated user's selection of the delegation action.
  • one or more delegation actions can be presented to the designated user, or a group of delegation actions can be presented.
  • the method can include a set of designated users which can be assigned from the plurality of users responsive to the originating user's selection of a set of designated users.
  • the selection of one of the designated users from the set of designated users can be determined based on a criterion 220 ( FIG. 3 ), responsive to determining the absence of access of the originating user on the online social network.
  • the criterion can be one of, or be included in criteria comprising, for example, the most active user in the social network of the set of designated users; a designated user with the same title as the originating user in a work environment; or a designated user who is currently online at the time of the detected absence.
  • a trusted user can also meet criteria or can also be designated, for example, a manager, or a person in an equivalent role in an organization.
  • a set of delegation actions can be presented to the designated user in response to determining the absence of an originating user.
  • the designated user can select a delegation action from the set of delegation actions.
  • the selected delegation action can be initiated once selected by the designated user.
  • one or more delegation rules can be specified for selecting a designated user.
  • the delegation rules can be based on context of a social group and the originating user.
  • a delegation rule can be selected from a group of rules.
  • a delegation rule can include: recent participant of a conversation; a list of designated users; a manager in a management chain of the originating user; or a work group member.
  • a delegation rule can be selected that selects a manager in a management chain.
  • the present disclosure enables a designated user to act on behalf of a user so that the originating user appears active, for instance, by posting for the originating user, or triggering a post for the originating user.
  • the designated user can also inform other users of the status or an activity of the originating user while the originating user is unable to post.
  • the designated user can be notified of the originating user's return.
  • the designated user can also be blocked from posting for the originating user.
  • the present disclosure enables an unavailable user to efficiently delegate updates, determining when a user is unavailable, selecting a second user, which can be from a set of preferred users, and identifying an update for the first user, and posting the update for the user.
  • the update may be selected from a template or using free form.
  • the present disclosure can include prompting the designated user to post on the originating user's behalf.
  • the designated user's post can be free form, or can be selected from a set of preconfigured and preapproved updates.
  • multiple users are part of an online social network.
  • An originating user has assigned a designated user. The originating user posts to the online social network, but then experiences a computer outage and is offline. The designated user is notified after the originating user is detected as offline or detected as absent.
  • the method and system of the present disclosure includes preconfigured updates. The designated user is identified, and notified of the originating user's absence, and prompted with the preconfigured updates. The originating user is able to access the online social network again, logs back in, and can see the post(s) on their behalf, and now can continue to post.
  • a user's unavailability can be determined by monitoring and accessing posting patterns. In one example, if access by a user drops below a standard deviation based on previous posting patterns, the method and system can assume the user is unavailable.
  • the method can use a last login time if a user is not logged in within a set time frame (and further during normal business hours), the method can assume the user is unavailable. When a user's availability falls below a threshold, the method can activate a designated user to post on behalf of the unavailable user.
  • the method and system can indicate any post by a designated user with a designation, such as, “on behalf of” the originating user.
  • a designation such as, “on behalf of” the originating user.
  • an indication of a post by a designated user can be used, such as a color, or typeset, typeface, or font, which designates the post as being from a designated user.
  • the device 70 may be a mobile device.
  • a mobile device is one embodiment of a device having a computer or computer system 20 , which is depicted generically in FIG. 1 .
  • Other devices having a computer or described as a computer or computer system may include, for example, a Personal Data Assistant (PDA), a cell phone, or a notebook, a desktop computer, or the like.
  • PDA Personal Data Assistant
  • the device in the present disclosure can be configured to send and receive electronic communications.
  • the computer system 20 is a generic representation of a computer which may be embodied in a device such as a hand held device, or can also represent a server for providing the method of the present disclosure as a service which can be accessible using the Internet or a network.
  • the method 100 may be embodied in a program 22 ( FIG. 1 ) embodied on a computer readable storage device, e.g., data storage device 24 .
  • the program 22 is executable by a processor 28 of a computer system 20 (to execute program steps, code, or program code). Additional data storage may also be embodied as a database 40 including data 44 .
  • the program or executable instructions may be offered as a service by a provider.
  • the computer 20 and program 22 shown in FIG. 1 are generic representations of a computer and program that may be local to a user, or provided as a remote service, such as website accessible using a network (e.g., interacting with the Internet or cloud services).
  • the computer 20 also generically represents herein a computer device or a computer included in a device, such as a laptop or desktop computer, etc., or one or more servers, alone or as part of a datacenter.
  • the computer system 20 can include a network interface 32 , and input/output (I/O) interface(s) 34 .
  • the I/O interface 34 allows for input and output of data with an external device 36 that may be connected to the computer system.
  • the network interface 32 may provide communications between the computer system and a computer network.
  • the method steps and system components and techniques may be embodied in modules of the program 22 for performing the tasks of each of the steps of the method and system, which are generically represented in FIG. 1 as program modules 26 .
  • the program 22 and program modules 26 can execute specific steps, routines, sub-routines, instructions or code, of the program.
  • the method of the present disclosure can be run locally on a device such as the mobile device, or can be run a service, for instance, on a remote server 90 which is accessed using the communications network 80 .
  • the communications network may include transmission media and network links which include, for example, wireless, wired, or optical fiber, and routers, firewalls, switches, and gateway computers.
  • the communications network may include connections, such as wire, wireless communication links, or fiber optic cables.
  • a communications network may represent a worldwide collection of networks and gateways, such as the Internet, that use various protocols to communicate with one another, such as Lightweight Directory Access Protocol (LDAP), Transport Control Protocol/Internet Protocol (TCP/IP), Hypertext Transport Protocol (HTTP), Wireless Application Protocol (WAP), etc.
  • LDAP Lightweight Directory Access Protocol
  • TCP/IP Transport Control Protocol/Internet Protocol
  • HTTP Hypertext Transport Protocol
  • WAP Wireless Application Protocol
  • a network may also include a number of different types of networks, such as, for example, an intranet, a local area network (LAN), or a wide area network (WAN).
  • LAN local area network
  • WAN wide area network
  • the present invention may be a system, a method, and/or a computer program product.
  • the computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • the computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device.
  • the computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing.
  • a non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing.
  • RAM random access memory
  • ROM read-only memory
  • EPROM or Flash memory erasable programmable read-only memory
  • SRAM static random access memory
  • CD-ROM compact disc read-only memory
  • DVD digital versatile disk
  • memory stick a floppy disk
  • a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon
  • a computer readable storage medium is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network.
  • the network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers.
  • a network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages.
  • the computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server.
  • the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider).
  • electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
  • the computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s).
  • the functions noted in the block may occur out of the order noted in the figures.
  • two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.

Abstract

A computer implemented method and system for delegating authority on an online account includes monitoring a user of a plurality of users using an online social network on a communications system. A designated user for an originating user from the plurality of users is assigned, responsive to the originating user of the plurality of user's selection of the designated user. The designated user is activated, responsive to determining an absence of access of the originating user on the online social network. A delegation action is presented to the designated user, and the delegation action is performed on behalf of the originating user, responsive to the designated user's selection of the delegation action.

Description

    BACKGROUND
  • The present disclosure relates to a method and system for delegating authority on an online account. Online social networks can be used to connect with other users, enable sharing between users, and process information between users. Online social networks can include social networks on a local network, a wide area network, utilizing the Internet, or a mail client including web-based email.
  • Common techniques of sharing and processing information can include an inbox, a post, or a profile on a social network. These techniques enable users to share information with others, or gather information from others. However, when a user is unable to access the social network there is a lack of alternative methods to post content, and to ascertain a user's absence, as well as to notify others of the user's absence.
  • Many conditions can be responsible for a user to be offline or unable to access the social network. For example, an identity provider of a social network may be unavailable for users who wish to login; a user can be locked out of a system or social network; a user's machine may be down (for example, nonfunctioning, broken, unavailable; lost or stolen), or a user's network access can be unavailable. In the above exemplary situations a user's online presence can be unavailable or offline. Issues that can occur when a user's online presence is unavailable include, for example: a user's input or contribution to the social group or network is not present; the other users' in the social group are not informed of the status of the unavailable user; and an alternative contact for the unavailable user may not be available.
  • SUMMARY
  • According to an aspect of the present invention, a computer implemented method delegates authority on an online account. The method monitors a user using a computer, the user is part of an online social network accessed using a communications system, and the online social network includes a plurality of users. A designated user for the user from the plurality of users is assigned, responsive to the user's selection of the designated user. The designated user is activated, responsive to determining an absence of access of the user on the online social network. A delegation action is presented to the designated user. The delegation action is performed on behalf of the user, responsive to the designated user's selection of the delegation action.
  • In another aspect of the present invention, a computer program product delegates authority on an online account. The computer program product includes a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se. The program instructions are executable by a computer to cause the computer to perform a method, comprising: monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users; assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user; activating the designated user, responsive to determining an absence of access of the user on the online social network; presenting a delegation action to the designated user; and performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
  • In another aspect of the present invention, a computer system delegates authority on an online account. The computer system includes one or more computer processors, one or more computer-readable storage media, and program instructions stored on one or more of the computer-readable storage media for execution by at least one of the one or more processors. The program instructions, comprise: monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users; assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user; activating the designated user, responsive to determining an absence of access of the user on the online social network; presenting a delegation action to the designated user; and performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
  • BRIEF DESCRIPTION OF THE SEVERAL VIEWS OF THE DRAWINGS
  • These and other objects, features and advantages of the present invention will become apparent from the following detailed description of illustrative embodiments thereof, which is to be read in connection with the accompanying drawings. The various features of the drawings are not to scale as the illustrations are for clarity in facilitating one skilled in the art in understanding the invention in conjunction with the detailed description. The drawings are described hereinbelow.
  • FIG. 1 is a schematic block diagram illustrating an overview of a system and methodology for delegating authority on an online account according to an embodiment of the disclosure.
  • FIG. 2 is a flow chart illustrating a method for delegating authority on an online account based on FIG. 1 according to an embodiment of the disclosure.
  • FIG. 3 is a schematic block diagram illustrating a method and system for delegating authority of an online account based on FIGS. 1 and 2, according to an embodiment of the disclosure.
  • DETAILED DESCRIPTION
  • Referring to FIGS. 1, 2 and 3 a system 10 and method 100 according to an embodiment of the present disclosure for delegating authority on an online account. The method 100 includes monitoring a user of a plurality of users using an online social network 84 on a communications system, as in block 104. Users 60 are shown in FIG. 1 using a representative device 70, which is envisioned as exemplary of each of the users. The device 70 includes a computer system 20. The device 70 can be a mobile device, or other types of computer devices. The device 70 includes a social networking software application 74 (also referred to as a social networking application), or can access a social network using a web browser (not shown) for accessing the Internet and accessing websites on the World Wide Web. A delegation application 78 is included on the device 70, which can be a separate application as shown in FIG. 1, and alternatively can be part (or integral with) the social networking application.
  • The users 60 can access the social network 84 using the device 70 via a communication system embodied as communications network 80, which can include, for example, the Internet, a telephone system, or a local area network.
  • Referring to FIG. 3, a functional diagram 200 with respect to the system 10 and method 100 (shown in FIGS. 1 and 2) includes an originating user 62 (as an embodiment of a user from the plurality of users 60 accessing the social network). The originating user selects a designated user 64 from the plurality of users 60, as in block 108. Responsive to the originating user 62 of the plurality of users 60 selection of the designated user 64, the method 100 assigns the designated user 64 for the originating user, as in block 112. For example, the designated user may be a work colleague, a friend, relative, or supervisor in a working relationship.
  • The method 100 can be implemented using the delegation application 78 shown in FIG. 1. The method can also be provided as a service which can be remote, for instance, including an application residing on a remote server exemplified by remote server 90.
  • The method determines an absence of access of the originating user 208 on the online social network, as in block 116. For example, an absence 208 can be determined by a lack of logging in by the originating user for a period of time. Alternatively, a user can be determined as absent if no activity has been logged within a time threshold. In one embodiment, an absence of access of the originating user can be determined by an absence of communication of the originating user which can include an absence of logging into the online social network. Another indication of absence of access of the originating user can be an absence of a device connection to the online social network. A lack of connection can be determined to indicate an absence of access when it occurs during a specified time frame, or exceeds a specified threshold time duration. Also, a lack of posts by an originating user, or alternatively a quantity of posts that do not meet a threshold, can indicate an absence of access.
  • The method 100 includes activating the designated user 64, as in block 120, when an absence of the originating user is detected, as in block 118. Thus, responsive to determining an absence of access, the method activates the designated user, as in block 120. When no absence of the originating user is detected in block 118, the method returns to block 104.
  • A delegation action 216 (FIG. 3) is presented to the designated user 64, as in block 124. The designated user selects a delegation action, as in block 128. The delegation action can be one action or a group a delegation actions for the designated user to select from. In one embodiment, the designated user can select one or more delegation actions. The delegation action can include, for example, approving of a post; sending a message; sending a message of unavailability of the originating user; or other tasks on behalf of the originating user.
  • The method 100 includes performing the delegation action 216 on behalf of the originating user 62, as in block 132, responsive to the designated user's selection of the delegation action. In one embodiment, one or more delegation actions can be presented to the designated user, or a group of delegation actions can be presented.
  • In one embodiment, the method can include a set of designated users which can be assigned from the plurality of users responsive to the originating user's selection of a set of designated users. The selection of one of the designated users from the set of designated users can be determined based on a criterion 220 (FIG. 3), responsive to determining the absence of access of the originating user on the online social network. The criterion can be one of, or be included in criteria comprising, for example, the most active user in the social network of the set of designated users; a designated user with the same title as the originating user in a work environment; or a designated user who is currently online at the time of the detected absence. A trusted user can also meet criteria or can also be designated, for example, a manager, or a person in an equivalent role in an organization.
  • In another embodiment, a set of delegation actions can be presented to the designated user in response to determining the absence of an originating user. The designated user can select a delegation action from the set of delegation actions. The selected delegation action can be initiated once selected by the designated user.
  • In another embodiment, one or more delegation rules can be specified for selecting a designated user. The delegation rules can be based on context of a social group and the originating user. A delegation rule can be selected from a group of rules. For example, a delegation rule can include: recent participant of a conversation; a list of designated users; a manager in a management chain of the originating user; or a work group member. For example, in an organizational environment, a delegation rule can be selected that selects a manager in a management chain.
  • The present disclosure enables a designated user to act on behalf of a user so that the originating user appears active, for instance, by posting for the originating user, or triggering a post for the originating user. The designated user can also inform other users of the status or an activity of the originating user while the originating user is unable to post.
  • Once the originating user is able to post/access their account, for example, by logging in, the designated user can be notified of the originating user's return. The designated user can also be blocked from posting for the originating user.
  • Thereby, the present disclosure enables an unavailable user to efficiently delegate updates, determining when a user is unavailable, selecting a second user, which can be from a set of preferred users, and identifying an update for the first user, and posting the update for the user. The update may be selected from a template or using free form.
  • The present disclosure can include prompting the designated user to post on the originating user's behalf. The designated user's post can be free form, or can be selected from a set of preconfigured and preapproved updates.
  • In one example according to an embodiment of the disclosure, multiple users are part of an online social network. An originating user has assigned a designated user. The originating user posts to the online social network, but then experiences a computer outage and is offline. The designated user is notified after the originating user is detected as offline or detected as absent. The method and system of the present disclosure includes preconfigured updates. The designated user is identified, and notified of the originating user's absence, and prompted with the preconfigured updates. The originating user is able to access the online social network again, logs back in, and can see the post(s) on their behalf, and now can continue to post.
  • In one example according to the present disclosure, a user's unavailability can be determined by monitoring and accessing posting patterns. In one example, if access by a user drops below a standard deviation based on previous posting patterns, the method and system can assume the user is unavailable.
  • The method can use a last login time if a user is not logged in within a set time frame (and further during normal business hours), the method can assume the user is unavailable. When a user's availability falls below a threshold, the method can activate a designated user to post on behalf of the unavailable user.
  • In another example according to an embodiment, the method and system can indicate any post by a designated user with a designation, such as, “on behalf of” the originating user. Alternatively, an indication of a post by a designated user can be used, such as a color, or typeset, typeface, or font, which designates the post as being from a designated user.
  • The device 70 may be a mobile device. A mobile device is one embodiment of a device having a computer or computer system 20, which is depicted generically in FIG. 1. Other devices having a computer or described as a computer or computer system may include, for example, a Personal Data Assistant (PDA), a cell phone, or a notebook, a desktop computer, or the like. The device in the present disclosure can be configured to send and receive electronic communications. The computer system 20 is a generic representation of a computer which may be embodied in a device such as a hand held device, or can also represent a server for providing the method of the present disclosure as a service which can be accessible using the Internet or a network.
  • In one embodiment according to the present disclosure, the method 100 may be embodied in a program 22 (FIG. 1) embodied on a computer readable storage device, e.g., data storage device 24. The program 22 is executable by a processor 28 of a computer system 20 (to execute program steps, code, or program code). Additional data storage may also be embodied as a database 40 including data 44. The program or executable instructions may be offered as a service by a provider. The computer 20 and program 22 shown in FIG. 1 are generic representations of a computer and program that may be local to a user, or provided as a remote service, such as website accessible using a network (e.g., interacting with the Internet or cloud services). It is understood that the computer 20 also generically represents herein a computer device or a computer included in a device, such as a laptop or desktop computer, etc., or one or more servers, alone or as part of a datacenter. The computer system 20 can include a network interface 32, and input/output (I/O) interface(s) 34. The I/O interface 34 allows for input and output of data with an external device 36 that may be connected to the computer system. The network interface 32 may provide communications between the computer system and a computer network. The method steps and system components and techniques may be embodied in modules of the program 22 for performing the tasks of each of the steps of the method and system, which are generically represented in FIG. 1 as program modules 26. The program 22 and program modules 26 can execute specific steps, routines, sub-routines, instructions or code, of the program. The method of the present disclosure can be run locally on a device such as the mobile device, or can be run a service, for instance, on a remote server 90 which is accessed using the communications network 80.
  • It is understood that a computer or a program running on the computer may communicate with a server computer via a communications network. The communications network may include transmission media and network links which include, for example, wireless, wired, or optical fiber, and routers, firewalls, switches, and gateway computers. The communications network may include connections, such as wire, wireless communication links, or fiber optic cables. A communications network may represent a worldwide collection of networks and gateways, such as the Internet, that use various protocols to communicate with one another, such as Lightweight Directory Access Protocol (LDAP), Transport Control Protocol/Internet Protocol (TCP/IP), Hypertext Transport Protocol (HTTP), Wireless Application Protocol (WAP), etc. A network may also include a number of different types of networks, such as, for example, an intranet, a local area network (LAN), or a wide area network (WAN).
  • Referring to FIG. 1, the present invention may be a system, a method, and/or a computer program product. The computer program product may include a computer readable storage medium (or media) having computer readable program instructions thereon for causing a processor to carry out aspects of the present invention.
  • The computer readable storage medium can be a tangible device that can retain and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. A non-exhaustive list of more specific examples of the computer readable storage medium includes the following: a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), a static random access memory (SRAM), a portable compact disc read-only memory (CD-ROM), a digital versatile disk (DVD), a memory stick, a floppy disk, a mechanically encoded device such as punch-cards or raised structures in a groove having instructions recorded thereon, and any suitable combination of the foregoing. A computer readable storage medium, as used herein, is not to be construed as being transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission media (e.g., light pulses passing through a fiber-optic cable), or electrical signals transmitted through a wire.
  • Computer readable program instructions described herein can be downloaded to respective computing/processing devices from a computer readable storage medium or to an external computer or external storage device via a network, for example, the Internet, a local area network, a wide area network and/or a wireless network. The network may comprise copper transmission cables, optical transmission fibers, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. A network adapter card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium within the respective computing/processing device.
  • Computer readable program instructions for carrying out operations of the present invention may be assembler instructions, instruction-set-architecture (ISA) instructions, machine instructions, machine dependent instructions, microcode, firmware instructions, state-setting data, or either source code or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C++ or the like, and conventional procedural programming languages, such as the “C” programming language or similar programming languages. The computer readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). In some embodiments, electronic circuitry including, for example, programmable logic circuitry, field-programmable gate arrays (FPGA), or programmable logic arrays (PLA) may execute the computer readable program instructions by utilizing state information of the computer readable program instructions to personalize the electronic circuitry, in order to perform aspects of the present invention.
  • Aspects of the present invention are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer readable program instructions.
  • These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, a programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable storage medium having instructions stored therein comprises an article of manufacture including instructions which implement aspects of the function/act specified in the flowchart and/or block diagram block or blocks.
  • The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other device to cause a series of operational steps to be performed on the computer, other programmable apparatus or other device to produce a computer implemented process, such that the instructions which execute on the computer, other programmable apparatus, or other device implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
  • The flowchart and block diagrams in the Figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods, and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems that perform the specified functions or acts or carry out combinations of special purpose hardware and computer instructions.
  • The embodiments, features, and instructive examples described above are illustrative, and should not be construed to limit the present disclosure to the particular embodiments or enumerated examples. Thus, various changes and modifications may be effected by one skilled in the art without departing from the spirit or scope of the disclosure as defined in the appended claims.

Claims (20)

What is claimed is:
1. A computer implemented method for delegating authority on an online account, comprising:
monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users;
assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user;
activating the designated user, responsive to determining an absence of access of the user on the online social network;
presenting a delegation action to the designated user; and
performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
2. The method of claim 1, further comprising:
assigning a set of designated users from the plurality of users responsive to the user of the plurality of users selection of the set of designated users; and
selecting one of the designated users from the set of designated users based on a criterion, responsive to determining the absence of access of the user on the online social network.
3. The method of claim 1, wherein the absence of access includes a time threshold.
4. The method of claim 1, further comprising:
presenting to the designated user a set of delegation actions; and
initiating a selected delegation action from the set of delegation actions responsive to the designated user's selection of the selected delegation action.
5. The method of claim 1, wherein the absence of access of the user is determined by an absence of communication of the user including a lack of logging into the online social network, or an absence of a device connection to the online social network, occurring during a specified time frame or exceeding a specified threshold time duration.
6. The method of claim 1, further comprising:
utilizing a delegation rule for selecting the designated user.
7. The method of claim 6, wherein the delegation rule is selected from a group of rules comprising: recent participant of a conversation; a list of designated users; a manager in a management chain of the user; and a work group member.
8. A computer program product for delegating authority on an online account, the computer program product comprising a computer readable storage medium having program instructions embodied therewith, wherein the computer readable storage medium is not a transitory signal per se, the program instructions executable by a computer to cause the computer to perform a method, comprising:
monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users;
assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user;
activating the designated user, responsive to determining an absence of access of the user on the online social network;
presenting a delegation action to the designated user; and
performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
9. The computer program product of claim 8, further comprising:
assigning a set of designated users from the plurality of users responsive to the user of the plurality of users selection of the set of designated users; and
selecting one of the designated users from the set of designated users based on a criterion, responsive to determining the absence of access of the user on the online social network.
10. The computer program product of claim 8, wherein the absence of access includes a time threshold.
11. The computer program product of claim 8, further comprising:
presenting a set of delegation actions to the designated user; and
initiating a selected delegation action from the set of delegation actions responsive to the designated user's selection of the selected delegation action.
12. The computer program product of claim 8, wherein the absence of access of the user is determined by a lack of communication of the user including an absence of logging into the online social network, or an absence of a device connection to the online social network, occurring during a specified time frame or exceeding a specified threshold time duration.
13. The computer program product of claim 8, further comprising:
utilizing a delegation rule for selecting the designated user.
14. The computer program product of claim 13, wherein the delegation rule is selected from a group of rules comprising: recent participant of a conversation; a list of designated users; a manager in a management chain of the user; and a work group member.
15. A computer system for delegating authority on an online account, the computer system comprising:
one or more computer processors, one or more computer-readable storage media, and program instructions stored on one or more of the computer-readable storage media for execution by at least one of the one or more processors, the program instructions, comprising:
monitoring a user using a computer, the user being part of an online social network accessed using a communications system, the online social network including a plurality of users;
assigning a designated user for the user from the plurality of users, responsive to the user's selection of the designated user;
activating the designated user, responsive to determining an absence of access of the user on the online social network;
presenting a delegation action to the designated user; and
performing the delegation action on behalf of the user, responsive to the designated user's selection of the delegation action.
16. The system of claim 15, further comprising:
assigning a set of designated users from the plurality of users responsive to the user of the plurality of users selection of the set of designated users; and
selecting one of the designated users from the set of designated users based on a criterion, responsive to determining the absence of access of the user on the online social network.
17. The system of claim 15, wherein the absence of access includes a time threshold.
18. The system of claim 15, further comprising:
presenting to the designated user a set of delegation actions; and
initiating a selected delegation action from the set of delegation actions responsive to the designated user's selection of the selected delegation action.
19. The system of claim 15, wherein the absence of access of the user is determined by an absence of communication of the user including a lack of logging into the online social network, or an absence of a device connection to the online social network, occurring during a specified time frame or exceeding a specified threshold time duration.
20. The system of claim 15, further comprising:
utilizing a delegation rule for selecting the designated user.
US14/809,301 2015-07-27 2015-07-27 Delegated updates Expired - Fee Related US10158732B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US14/809,301 US10158732B2 (en) 2015-07-27 2015-07-27 Delegated updates

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US14/809,301 US10158732B2 (en) 2015-07-27 2015-07-27 Delegated updates

Publications (2)

Publication Number Publication Date
US20170034290A1 true US20170034290A1 (en) 2017-02-02
US10158732B2 US10158732B2 (en) 2018-12-18

Family

ID=57883368

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/809,301 Expired - Fee Related US10158732B2 (en) 2015-07-27 2015-07-27 Delegated updates

Country Status (1)

Country Link
US (1) US10158732B2 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10778616B2 (en) 2018-07-24 2020-09-15 International Business Machines Corporation Propagating online conversations

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5907597A (en) * 1994-08-05 1999-05-25 Smart Tone Authentication, Inc. Method and system for the secure communication of data
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US20110231199A1 (en) * 2010-03-18 2011-09-22 Cunningham Argus I Methods and Systems for Internet-Based Network Shareholder Electronic Voting Rights Reassignment
US20120330789A1 (en) * 2011-06-27 2012-12-27 Heck Ryan A Limitation protocol
US20130073636A1 (en) * 2011-09-19 2013-03-21 Telefonaktiebolaget L M Ericsson (Publ) Group chat across networks
US20130092730A1 (en) * 2011-10-05 2013-04-18 Jacques Blinbaum Interactive code processing platform providing interaction between parties generating and disseminating single and multidimensional optical and digital codes
US8484703B2 (en) * 2004-10-06 2013-07-09 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
US8539046B2 (en) * 2007-06-15 2013-09-17 Microsoft Corporation Delegated pre-configuration
US20140041055A1 (en) * 2012-08-06 2014-02-06 Avaya Inc. System and method for online access control based on users social network context
US8745249B2 (en) * 2010-12-28 2014-06-03 Konkuk University Industrial Cooperation Corp. Intelligence virtualization system and method to support social media cloud service
US8756163B2 (en) * 2009-03-19 2014-06-17 Tagged, Inc. System and method of selecting a relevant user for introduction to a user in an online environment
US8806584B2 (en) * 2004-07-22 2014-08-12 Facebook, Inc. Authorization and authentication based on an individual's social network
US20140359042A1 (en) * 2013-05-31 2014-12-04 Jeffrey G. Fenley Programmable Automation with the Aid of a Social Network
US9003486B2 (en) * 2012-01-17 2015-04-07 Nokia Corporation Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests
US9038146B1 (en) * 2011-02-05 2015-05-19 Google Inc. Delegation as a mechanism to manage business activity by taking on a shared identity
US20150163311A1 (en) * 2013-11-26 2015-06-11 Martin Charles Heath Systems and methods for capturing, managing, and triggering user journeys associated with trackable digital objects
US20150195313A1 (en) * 2014-01-07 2015-07-09 Google Inc. Offline content sharing
US9094360B1 (en) * 2013-04-08 2015-07-28 Google Inc. Access right authorization
US9178883B2 (en) * 2012-12-12 2015-11-03 SocialSign.in, Inc. Leveraging online identities to grant access to private networks
US9369451B2 (en) * 2013-02-14 2016-06-14 Dicentral Corporation Systems, methods, and apparatuses for sharing rights
US20160259538A1 (en) * 2015-03-03 2016-09-08 DStephens & Associates Partnership Integrated agent player-client management system and method with automated event trigger initiated communications
US9460299B2 (en) * 2010-12-09 2016-10-04 Location Labs, Inc. System and method for monitoring and reporting peer communications
US20170076518A1 (en) * 2015-09-11 2017-03-16 Comcast Cable Communications, Llc Consensus Based Authentication and Authorization Process
US20170083721A1 (en) * 2012-01-13 2017-03-23 Microsoft Technology Licensing, Llc Sustained data protection

Family Cites Families (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8204938B2 (en) 2003-02-14 2012-06-19 Devereux Research Ab Llc System and method for immediate and delayed real-time communication activities using availability data from and communications through an external instant messaging system
US7395097B2 (en) 2004-12-03 2008-07-01 Motorola, Inc. Communications device with low energy notification
WO2011103916A1 (en) 2010-02-24 2011-09-01 Telefonaktiebolaget Lm Ericsson (Publ) Method for managing access to protected resources and delegating authority in a computer network
WO2011161674A1 (en) 2010-06-23 2011-12-29 Eyal Wiener Real-time automatic user status recognition and broadcasting service
KR101187742B1 (en) * 2010-12-09 2012-10-05 주식회사 이너스커뮤니티 Social Network Service Apparatus and Method therefor
US20150188993A1 (en) * 2012-06-01 2015-07-02 Mark Dibner System and method of storing and distributing data
US20130332250A1 (en) * 2012-06-06 2013-12-12 United Video Properties, Inc. Systems and methods for providing conditional group purchase offers for media content
FR2993688B1 (en) 2012-07-20 2015-08-28 Oberthur Technologies DELEGATION OF RIGHTS OF ACCESS TO ACCOUNT AFTER DISAPPEARANCE OF THE USER
US9275149B2 (en) * 2012-08-22 2016-03-01 International Business Machines Corporation Utilizing social network relevancy as a factor in ranking search results
US20140195445A1 (en) 2013-01-04 2014-07-10 International Business Machines Corporation System and method for compliance risk mitigation
KR20140109000A (en) * 2013-03-04 2014-09-15 이영수 GNS(Generation Networking Service) System, and therefor method for managing the same
US20140279688A1 (en) * 2013-03-15 2014-09-18 Cfph, Llc Dollar Depository Receipts and Electronic Friends Trading and Repo Transactions
US20140280962A1 (en) 2013-03-15 2014-09-18 Openpeak Inc. Method and system for delegating functionality based on availability
US9990836B2 (en) * 2013-07-16 2018-06-05 Rockwilli RMR LLC Systems and methods for automated personal emergency responses
US9547977B2 (en) * 2013-07-16 2017-01-17 Rockwilli RMR LLC Systems and methods for automated personal emergency responses
CN105659521B (en) * 2014-03-12 2019-07-16 腾讯科技(深圳)有限公司 Method and apparatus for controlling peripheral equipment by social network-i i-platform
US20170099251A1 (en) * 2015-05-11 2017-04-06 Bounta LLC Method And System For Designating And Using Proxies On A Web Based Social Network

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5907597A (en) * 1994-08-05 1999-05-25 Smart Tone Authentication, Inc. Method and system for the secure communication of data
US5941947A (en) * 1995-08-18 1999-08-24 Microsoft Corporation System and method for controlling access to data entities in a computer network
US8806584B2 (en) * 2004-07-22 2014-08-12 Facebook, Inc. Authorization and authentication based on an individual's social network
US8484703B2 (en) * 2004-10-06 2013-07-09 Mcafee, Inc. Systems and methods for delegation and notification of administration of internet access
US8539046B2 (en) * 2007-06-15 2013-09-17 Microsoft Corporation Delegated pre-configuration
US8756163B2 (en) * 2009-03-19 2014-06-17 Tagged, Inc. System and method of selecting a relevant user for introduction to a user in an online environment
US20110231199A1 (en) * 2010-03-18 2011-09-22 Cunningham Argus I Methods and Systems for Internet-Based Network Shareholder Electronic Voting Rights Reassignment
US9460299B2 (en) * 2010-12-09 2016-10-04 Location Labs, Inc. System and method for monitoring and reporting peer communications
US8745249B2 (en) * 2010-12-28 2014-06-03 Konkuk University Industrial Cooperation Corp. Intelligence virtualization system and method to support social media cloud service
US9038146B1 (en) * 2011-02-05 2015-05-19 Google Inc. Delegation as a mechanism to manage business activity by taking on a shared identity
US20120330789A1 (en) * 2011-06-27 2012-12-27 Heck Ryan A Limitation protocol
US20130073636A1 (en) * 2011-09-19 2013-03-21 Telefonaktiebolaget L M Ericsson (Publ) Group chat across networks
US20130092730A1 (en) * 2011-10-05 2013-04-18 Jacques Blinbaum Interactive code processing platform providing interaction between parties generating and disseminating single and multidimensional optical and digital codes
US20170083721A1 (en) * 2012-01-13 2017-03-23 Microsoft Technology Licensing, Llc Sustained data protection
US9003486B2 (en) * 2012-01-17 2015-04-07 Nokia Corporation Methods and apparatus for reliable and privacy protecting identification of parties' mutual friends and common interests
US20140041055A1 (en) * 2012-08-06 2014-02-06 Avaya Inc. System and method for online access control based on users social network context
US9178883B2 (en) * 2012-12-12 2015-11-03 SocialSign.in, Inc. Leveraging online identities to grant access to private networks
US9369451B2 (en) * 2013-02-14 2016-06-14 Dicentral Corporation Systems, methods, and apparatuses for sharing rights
US9094360B1 (en) * 2013-04-08 2015-07-28 Google Inc. Access right authorization
US20140359042A1 (en) * 2013-05-31 2014-12-04 Jeffrey G. Fenley Programmable Automation with the Aid of a Social Network
US20150163311A1 (en) * 2013-11-26 2015-06-11 Martin Charles Heath Systems and methods for capturing, managing, and triggering user journeys associated with trackable digital objects
US20150195313A1 (en) * 2014-01-07 2015-07-09 Google Inc. Offline content sharing
US20160259538A1 (en) * 2015-03-03 2016-09-08 DStephens & Associates Partnership Integrated agent player-client management system and method with automated event trigger initiated communications
US20170076518A1 (en) * 2015-09-11 2017-03-16 Comcast Cable Communications, Llc Consensus Based Authentication and Authorization Process

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10778616B2 (en) 2018-07-24 2020-09-15 International Business Machines Corporation Propagating online conversations

Also Published As

Publication number Publication date
US10158732B2 (en) 2018-12-18

Similar Documents

Publication Publication Date Title
US11057230B2 (en) Expected group chat segment duration
US10511496B2 (en) Method, system and computer program product for interception, quarantine and moderation of internal communications of uncontrolled systems
US10771492B2 (en) Enterprise graph method of threat detection
US9871758B2 (en) User recommendations in a social media network
US10263929B2 (en) Cloud based chat governance system based on behavioral patterns and situational-awareness
US20110320582A1 (en) Online presence management system
US10523769B2 (en) Facilitation of communications to another party using cognitive techniques
US10237228B2 (en) Initiating social interaction based on E-mail content
US10257149B2 (en) Prioritizing messages in an activity stream with an actionable item or event for the user to respond
US10216735B2 (en) Social networking response management system
US20150278750A1 (en) Virtual personal assistant in messenger
US20160088121A1 (en) Bridging relationships across enterprise and personal social networks
US11637908B2 (en) Apparatus, method, and computer program product for modifying user interfaces based on an application context-based concentration mode status
US20200177404A1 (en) Communications analysis and participation recommendation
US20150278748A1 (en) Routing trouble tickets to proxy subject matter experts
US20140195445A1 (en) System and method for compliance risk mitigation
US10521770B2 (en) Dynamic problem statement with conflict resolution
US20170093644A1 (en) Identifying changes in multiple resources related to a problem
US10158732B2 (en) Delegated updates
US9948581B2 (en) Allow hidden and silent observers in a group conversation
US10284510B2 (en) Technology for message delivery to subscribers in a network
US10824974B2 (en) Automatic subject matter expert profile generator and scorer
US9961040B2 (en) Social network and collaboration communications routing enhancement
US20210157867A1 (en) User-specific summary generation based on communication content analysis
US20180097704A1 (en) Determining receptiveness to a new communication

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:ABOU MAHMOUD, ALAA;BASTIDE, PAUL R.;LU, FANG;REEL/FRAME:036180/0701

Effective date: 20150722

STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20221218